Functional Re-encryption and Collusion-Resistant Obfuscation

  title={Functional Re-encryption and Collusion-Resistant Obfuscation},
  author={Nishanth Chandran and Melissa Chase and Vinod Vaikuntanathan},
We introduce a natural cryptographic functionality called functional re-encryption. Informally, this functionality, for a public-key encryption scheme and a function F with n possible outputs, transforms (“re-encrypts”) an encryption of a message m under an “input public key” pk into an encryption of the same message m under one of the n “output public keys”, namely the public key indexed by F (m). In many settings, one might require that the program implementing the functional reencryption… CONTINUE READING


Publications referenced by this paper.
Showing 1-10 of 29 references

Secure Obfuscation for Encrypted Signatures

View 5 Excerpts
Highly Influenced

On the impossibility of obfuscation with auxiliary input

46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05) • 2005
View 4 Excerpts
Highly Influenced

On Data Banks and Privacy Homomorphisms

L. Ronald, Rivest, Len Adleman, Loizos Michael, Dertouzos
View 1 Excerpt

Predicate Privacy in Encryption Systems

IACR Cryptology ePrint Archive • 2008
View 2 Excerpts

Similar Papers

Loading similar papers…